Login / Signup
Traitor tracing scheme with constant ciphertext rate against powerful pirates.
Thomas Sirvent
Published in:
IACR Cryptol. ePrint Arch. (2006)
Keyphrases
</>
ciphertext
standard model
proxy re encryption
public key encryption
cca secure
access structure
secret key
attribute based encryption
public key
private key
authentication scheme
security model
encryption scheme
identity based encryption
signature scheme
diffie hellman
provably secure
image processing
knn